EP3223488B1 - Procédé d'authentification sécurisée de dispositifs mobiles - Google Patents
Procédé d'authentification sécurisée de dispositifs mobiles Download PDFInfo
- Publication number
- EP3223488B1 EP3223488B1 EP17165970.9A EP17165970A EP3223488B1 EP 3223488 B1 EP3223488 B1 EP 3223488B1 EP 17165970 A EP17165970 A EP 17165970A EP 3223488 B1 EP3223488 B1 EP 3223488B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- mobile device
- channel
- authentication
- authentication data
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 27
- 238000004891 communication Methods 0.000 claims description 61
- 230000006854 communication Effects 0.000 claims description 61
- 238000012545 processing Methods 0.000 claims description 10
- 230000003287 optical effect Effects 0.000 claims description 9
- 230000000007 visual effect Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 description 11
- 230000005540 biological transmission Effects 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 238000010295 mobile communication Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 230000015654 memory Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/77—Graphical identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- This invention relates generally to communication systems, and, more particularly, to wireless communication systems.
- Wireless communication systems are commonly employed to provide voice and/or data communications.
- Existing and emerging wireless communication systems are generally comprised of heterogeneous collections of air-interface technologies, network architectures, and wireless protocols.
- wireless communication systems may operate using IEEE-802.11 (Wi-Fi) wireless networks that provide access to local area and "hotspot” networks, Bluetooth connectivity, IEEE-802.16 (WiMax) networks that provide fixed wireless and mobile broadband access, Evolution Data Optimized networks (1xEVDO) that provide access to third generation (3G) mobile data users, and the like.
- Wireless communications introduce a new degree of security risk over conventional land-based systems.
- adversaries are able to more easily eavesdrop on communications because information is sent over a wireless link that is considered more accessible than conventional land-based channels.
- mobile devices e.g., laptop computers, cell phones, personal digital assistances, and the like
- users are becoming increasingly susceptible to adversary attacks attempting to gain unauthorized access to stored data.
- adversaries may attempt to eavesdrop on wireless communications to intercept authentication data, such as passwords, media access control (MAC) addresses, personal identification numbers (PINs), security keys, and the like. Adversaries may use this information to gain unauthorized access to wireless communication systems and/or other mobile devices.
- authentication data such as passwords, media access control (MAC) addresses, personal identification numbers (PINs), security keys, and the like.
- Adversaries may use this information to gain unauthorized access to wireless communication systems and/or other mobile devices.
- an adversary may eavesdrop during the pairing of mobile devices.
- the terms 'authentication', 'authenticate', 'pairing', and 'pair' are intended to be used interchangeably to generally refer to algorithms, processes, mechanisms, and/or data used to establish trusted communications.
- the adversary may "listen” to intercept the PIN(s) of one or more mobile devices. With this information, the adversary may decode data required to pair itself with one or more of the mobile devices participating in the wireless communication. If successful, the adversary may gain unauthorized access to personal data, such as calendar data, address books, email, credit card information, and the like.
- US2005221813 relates to utilizing a first default communication interface (cellular) to initiate communications via a second auxiliary communication interface (Bluetooth, Wi-Fi); policy and authentication information are sent from initiator to target via default link.
- a first default communication interface cellular
- a second auxiliary communication interface Bluetooth, Wi-Fi
- US2003119568 relates to an active system using a companion wake-up transmitter to send RF signal and data including an identifier code to excite companion wake-up receiver.
- Filter compares the code to a stored code and if they match, activates further components of device. If the ID codes do not match no further action is taken.
- Wireless wake-up receiver then activates wireless bi-directional communication transceiver (Bluetooth, Wi-Fi) and both parties can establish communication.
- US2003200434 relates to an automatic identification process carried out by placing the two devices in close proximity with one another, and transmitting very short range signals from the master apparatus, to be exclusively received by the slave apparatus. If the two devices are able to communicate over this short range, an identification key is generated and passed to the slave apparatus for subsequent exchanges in normal, larger range communications.
- WO2004090800A2 relates to an apparatus as well as a method for reliably determining the deliberate use of a contactless data carrier.
- the term "contactless data carrier" used in WO2004090800A2 refers to all arrangements, which have a microchip and an antenna connected to it and are adapted to exchange data with a suitable reading device. These include, beside chip cards for payment applications, contactlessly readable identification documents, such as passports and identity cards with built-in microchip as well as, furthermore, RFID labels. Beside an antenna-based data transmission channel in dependence on the data to be transmitted additionally an optical data transmission channel between reading device and contactless data carrier can be employed.
- the additional data transmission channel by optical means data are exchanged between reading device and data carrier, which are suitable to perform an authentication between reading device and contactless card.
- the authentication via the additional data transmission channel prevents an unintentional actuation of the contactless card, since the optical information is not available, when the data carrier is not optically visible to the reading device, for instance is carried in a bag/purse.
- the data carrier has optically readable information, such as e.g. a bar code or matrix code.
- an optical reading device e.g. a bar code scanner.
- the optically read information then can be used by the contactless data carrier for authenticating purposes between itself and the contactless reading device, in order to in such a way furnish the authorization for a subsequent transaction.
- the present invention is directed to addressing the effects of one or more of the problems set forth above.
- the software implemented aspects of the invention are typically encoded on some form of program storage medium or implemented over some type of transmission medium.
- the program storage medium may be magnetic (e.g., a floppy disk or a hard drive), optical (e.g., a compact disk read only memory, or "CD ROM"), or based on other technologies and may be read only or random access.
- the transmission medium may be twisted wire pairs, coaxial cable, optical fiber, wireless transmission, or some other suitable transmission medium known to the art. The invention is not limited by these aspects of any given implementation.
- wireless communications network 100 is illustrated.
- the terms “wireless communication network”, “mobile network”, and “wireless network” are used interchangeably herein to generally describe a communication network that is operable to provide mobile communication to its subscribers.
- the wireless communication network 100 may be a 1xEVDO network that is generally compliant with technical specifications and technical reports for a 3 rd Generation Mobile System that have been developed by a 3 rd Generation Partnership Project (3GPP). It should be understood, however, that the present invention may be applicable to wireless communication networks supporting other wireless protocols, such as Wi-Fi, Bluetooth, WiMax, and the like.
- the wireless communication network 100 allows one or more mobile devices 105 to communicate with a data network 110, such as the Internet, and/or a Publicly Switched Telephone Network (PSTN) 115 through one or more access points 120 (e.g., base stations, Wi-Fi transceivers, etc.).
- the mobile devices 105 may take the form of any of a variety of devices, including cellular phones, personal digital assistants (PDAs), laptop computers, digital pagers, wireless cards, and any other similar type electronic device.
- a plurality of the access points 120 may be coupled to a core network (CN) 125 by one or more connections 130, such as T1/E1 lines or circuits, ATM circuits, cables, digital subscriber lines (DSLs), and the like.
- the communication network 100 may be comprised of other devices (not shown), such as radio network controllers (RNC), management processors, and the like.
- RNC radio network controllers
- management processors and the like.
- the CN 125 operates as an interface to a data network 110 and/or to the PSTN 115.
- the CN 125 may perform a variety of functions and operations, such as user authentication.
- the process of authenticating a mobile device 105 for trusted communication may be performed by any number of devices in the communication network 100, such as the access point 120 or other devices (not shown).
- the authentication processing may be performed by one or more mobile devices 105. Therefore, it will be appreciated that a detailed description of the structure and operation of the CN 125 is not necessary to an understanding and appreciation of the instant invention. Accordingly, to avoid unnecessarily obfuscating the instant invention, further details of the CN 125 are not presented herein.
- the wireless communication network 100 facilitates communications between the mobile devices 105, the data network 110 and/or the PSTN 115. It should be understood, however, that the configuration of the wireless communication network 100 is exemplary in nature, and that fewer or additional components may be employed in other embodiments of the communications system 100 without departing from the scope of the instant invention.
- Figure 2 illustrates mobile-to-mobile communication not related to the invention between a plurality of mobile devices 105 Although only three mobile devices 105 are illustrated for this particular example, it should be appreciated that mobile-to-mobile communication is possible between two or more mobile devices 105. Furthermore, although not shown, one or more of the mobile devices 105 may also be in data communication with a communication network, such as the communication network 100 illustrated in Figure 1 .
- Mobile-to-mobile communication may be implemented using any number of known or to be developed wireless technologies and protocols.
- the mobile devices 105 are shown communicating over a primary channel 200.
- the primary channel 200 is a radio frequency channel.
- FIG. 3 a method for authenticating a mobile device 105 in accordance with one embodiment of the present invention is shown.
- the method is described with reference to the communication network 100 shown in Figures 1 and 2 , respectively. It should be appreciated, however, that the method is equally applicable to other wireless networks and mobile-to-mobile configurations.
- a communication request is received from a mobile device 105.
- the mobile device 105 is operable to communicate over a primary channel 200.
- the primary channel 200 is the intended data communication channel for a given wireless technology and typically provides the mobile device 105 some freedom of movement, while maintaining the data communication.
- the primary channel is ordinarily a radio frequency channel between the mobile device 105, an access point 120, and/or another mobile device 105.
- the primary channel 200 is typically realized between two or more mobile devices 105.
- the primary channel 200 may also include communication with other devices, such as desktop computers, electronic kiosks, or any other electronic device capable of interpreting the communication request.
- a primary channel 400 for data communication is shown between a first device 405 and a second device 410.
- Both the first and second devices 405, 410 are mobile devices.
- additional electronic devices may also be capable of communicating with the first and second devices 405, 410 using the primary channel 400.
- a secondary channel 415 that is operable for short-range communication is used to exchange authentication data.
- the examples will primarily focus on the case where the secondary channel 415 is used to pair two or more mobile devices.
- the second device 410 receives a communication request from the first device 405.
- the communication request may be a signal from the first device 405 indicating an intent to pair with the second device 410.
- the communication request is ordinarily generated by a device desiring to initiate wireless communication. It should be understood that the communication request may be generated by any device to indicate a desire to participate in wireless communication.
- the form of the communication request may vary depending upon the wireless technology. Ordinarily, the request includes data the receiver will recognize and interpret as a communication request. Moreover, the communication request is transmitted over the primary channel 400. As described, the secondary channel 415 is a short-range channel that utilizes physical proximity to exchange data, whereas, relative to the secondary channel 415, the primary channel 400 is a longer range channel permitting greater physical mobility.
- the secondary channel 415 is a short-range channel that relies on physical proximity to exchange data. As opposed to the primary channel 400, which permits greater separation distance, the secondary channel 415 requires the mobile device to be placed proximate the device it is attempting to authenticate with. This physical proximity makes it more difficult, if not impossible, for an adversary to pair with another party without detection. This is because, during the
- the adversary can no longer rely on the primary channel 400 to maintain a safe distance from its target.
- the secondary channel 415 is realized using radio frequency identification (RFID) technology.
- RFID radio frequency identification
- the first device 405 may be equipped with an RFID tag (not shown).
- the RFID tag may be part of an authentication controller 420.
- the authentication controller 420 and other components shown for the first and second devices 405 and 410 are intended for the purpose of illustration and not limitation.
- the functionality described herein may be configured to be operable with less than or more than the components shown in the accompanying Figures and that the actual system configuration may vary as a matter of design choice.
- the REID tag may be active or passive.
- An active RFID tag is typically associated with its own power source, whereas passive tags are RFID tags without a power source. Passive tags are ordinarily temporarily activated by the radio frequency scan of a reader. However, the particular configuration and operation of active and passive RFID tags may vary depending upon the particular application.
- the first device 405 is equipped with a transmitter 425, such as an antenna, for transmitting data associated with the RFID tag to another device.
- the RFID tag When activated, the RFID tag ordinarily generates a signal that includes identification data such as an identification number.
- the second device 410 is configured with a reader 430 for receiving the data associated with the RFID tag of the first device 405.
- the working distance of RFD is ordinarily far less than typical wireless technologies, such as Bluetooth, Wi-Fi, and the like.
- the secondary channel 415 used for transmitting RFID data is typically about 1 meter or less.
- the primary channel is ordinarily around 10 meters. Accordingly, RFID enforces the physical proximity desired to reduce or possibly eliminated unauthorized pairing.
- a user with a Mobile device 105 equipped with an RFID tag would be required to physically hold his or her mobile device 105 approximately 50cm or closer to the other party in order to read/exchange RFID data. It would be difficult, if not impossible, for an adversary to come within such close physical proximity and still avoid detection.
- both parties 405 and 410 are configured with RFID tags, transmitters 425, and readers 430.
- both parties 405, 410 and any other party wishing to pair can exchange RFID data to determine whether the parties are trusted.
- the received authentication data is processed to determine whether the mobile device 105 is a trusted device (i.e., determine whether it is an authorized device that is attempting to pair).
- the RFID tag generates the authentication data, which as described may include identification data.
- the identification data may include any binary string of data operable for uniquely identifying the mobile device 105.
- the second device 410 reads the authentication data and passes it to the authentication controller 420.
- the authentication controller 420 may be configured to determine whether it is a trusted device that is attempting to pair.
- the authentication data may be used as a parameter input into an authentication algorithm programmed on the authentication controller 420.
- the RFID information may be used as a seed for the pairing process. After processing the RFID information through its programmed authentication algorithm, the authentication controller 420 may determine whether an expected result. is returned. If so, the authentication controller 420 determines that it is communicating with a trusted device and allows the paring process to be completed.
- the complexity of the authentication algorithm used for processing the authentication data may vary as a matter of design choice.
- the authentication data exchanged over the secondary channel 415 may be configured to vary at certain intervals, such that it serves as a nonce (i.e., time varying parameter) for the authentication algorithm.
- the RFID information may be configured to vary at some predetermined time interval, such as every 5 seconds. This variation in authentication data reduces the opportunity for an adversary to read the same RFID information at a later stage.
- the receiver may have to be synchronized with the sender, thus making it even more difficult for a would-be adversary to gain unauthorized access to a mobile device 105.
- the authentication data exchanged over the secondary channel 415 is information encoded on a bar code.
- the reader 430 of the second device may be a bar code reader, such as a camera, scanner, laser, or similar device for capturing bar code information.
- a bar code reader such as a camera, scanner, laser, or similar device for capturing bar code information.
- mobile devices 105 are being equipped with cameras. This trend will likely continue as providers of mobile devices 105 continue to endeavor to add more functionality. Such cameras may be used to capture an image of the bar code such that authentication data encoded in the bar code may be decoded and used to determine whether the party associated with the bar code is a trusted party.
- the mobile device 105 is configured to process the authentication data decoded from the bar code using any number of different authentication algorithms.
- the receiver - the second device 410 in Figure 4 - is required to be within physical proximity of the bar code. With conventional cameras, this is typically made possible with a range of approximately 1 meter or less. Accordingly, the physical proximity of the secondary channel 415 is realized when the camera captures an image of the bar code.
- the secondary channel 415 is an optical channel using visual line-of-sight as opposed to the radio frequency channel described for the RFID example.
- the bar code encoding the authentication data may be a one-dimensional or two-dimensional bar code.
- One difference between one-dimensional and two-dimensional bar codes is that the latter one are easier to read with low-quality cameras such as are applied in mobile devices.
- a bar code may encode a sufficient amount of authentication data so that the receiving party is not required to store additional data to authenticate the party. It should be appreciated, however, that the particular encoding scheme may vary as a matter of design choice and that the subsequent processing of data decoded from the bar code may vary depending upon the particular application.
- the bar code is electronically generated on the display of the mobile device 105.
- a simplified representation of a mobile device 105 is shown.
- the mobile device 105 is equipped with a display 500.
- Most, if not all, mobile devices 105 include a display as part of their user interface.
- the display 500 is used to present a bar code 505 for reading by another party. That is, the bar code 505 is presented on the display 500 while the mobile device 105 is in proximity of the reader 430 (e.g., camera) of another party. When the camera of the reading party is activated, an image of the bar code 505 is captured, thus transferring the encoded authentication data over the secondary channel 415.
- the reader 430 e.g., camera
- bar codes When presented on a display, bar codes is easily changed on a regular basis. Similar to varying RFIDs, periodically changing bar codes according to a predetermined schedule or in a random manner adds an additional security mechanism to thwart would-be adversaries.
- the authentication algorithm is designed such that the parties must be synchronized for paring to be successful.
- both parties 405, 410 involved in the authentication process are in physical proximity, an explicit trust relationship is established. That is, because of the physical proximity of the devices, both parties 405, 410 can physically see who they are pairing with. The physical proximity is enforced by the short-range nature of the secondary channel 415.
- the secondary channel 415 may be used to exchange other information, while the connection exists. Because of the short-range nature of the secondary channel 415, it can be expected, however, that this connection will exist only for a short time.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Claims (14)
- Procédé d'authentification d'un premier dispositif mobile (405, 105) pour une communication sans fil, le procédé étant réalisé par un deuxième dispositif mobile (410) et comprenant :- la réception d'une demande de communication (300) à partir du premier dispositif mobile (405, 105), dans lequel le premier dispositif mobile (405, 105) peut fonctionner pour échanger des données sur un canal primaire (400), et dans lequel la demande de communication (300) est reçue en utilisant le canal primaire (400) ;
et ensuite- la réception de données d'authentification (305) à partir du premier dispositif mobile (405, 105) sur un canal secondaire (415), dans lequel les données d'authentification échangées sur le canal secondaire (415) comportent des informations codées sur un code à barres (505), dans lequel le code à barres (505) est généré électroniquement et présenté sur un affichage du premier dispositif mobile (105), dans lequel le code à barres (505) change selon une planification prédéterminée ou de manière aléatoire, dans lequel le canal secondaire (415) est un canal à courte portée pouvant fonctionner pour échanger des données lorsque le premier dispositif mobile (405, 105) est à proximité physique et qu'il est différent du canal primaire, dans lequel le canal primaire (400), par rapport au canal secondaire (415), est un canal à plus longue portée permettant plus de mobilité physique, dans lequel le canal primaire est un canal Bluetooth ou un canal Wi-Fi ; et- le traitement des données d'authentification (310) afin de déterminer si le premier dispositif mobile (105) est un dispositif de confiance, en utilisant les données d'authentification comme entrée de paramètre variant dans le temps dans un algorithme d'authentification programmé sur un dispositif de commande d'authentification. - Procédé selon la revendication 1,
dans lequel les données d'authentification sont traitées par le deuxième dispositif mobile (105) pour jumeler les premier et deuxième dispositifs mobiles (105). - Procédé selon l'une quelconque des revendications 1 et 2,
dans lequel la réception des données d'authentification comprend en outre la capture d'une image du code à barres (505) en utilisant un lecteur. - Procédé selon la revendication 3,
dans lequel le canal secondaire (415) est un canal optique utilisant une ligne de visée visuelle et/ou pouvant fonctionner pour échanger les données d'authentification entre une distance d'environ 1 mètre ou moins. - Procédé selon l'une quelconque des revendications 3 et 4,
dans lequel le lecteur est une caméra, un dispositif de balayage ou un laser. - Procédé selon l'une quelconque des revendications 1 à 5,
dans lequel le traitement comprend la comparaison des données d'authentification avec des valeurs stockées afin de déterminer si une concordance existe. - Procédé selon l'une quelconque des revendications 1 à 5,
dans lequel les données d'authentification varient à certains intervalles de temps de sorte à servir de paramètre variant dans le temps pour l'algorithme d'authentification. - Deuxième dispositif mobile (410) authentifiant un premier dispositif mobile pour une communication sans fil (405, 105), le deuxième dispositif mobile comprenant :- des moyens de réception (430) pour- recevoir une demande de communication (300) à partir du premier dispositif mobile (105), dans lequel le premier dispositif mobile (105) peut fonctionner pour échanger des données sur un canal primaire (400), et dans lequel la demande de communication (300) est reçue en utilisant le canal primaire (400) ;
et ensuite- recevoir des données d'authentification (305) à partir du premier dispositif mobile (105) sur un canal secondaire (415), dans lequel les données d'authentification échangées sur le canal secondaire (415) comportent des informations codées sur un code à barres (505), dans lequel le code à barres (505) est généré électroniquement et présenté sur un affichage du premier dispositif mobile (105), dans lequel le code à barres (505) change selon une planification prédéterminée ou de manière aléatoire, dans lequel le canal secondaire (415) est un canal à courte portée pouvant fonctionner pour échanger des données lorsque le premier dispositif mobile (105) est à proximité physique et qu'il est différent du canal primaire, dans lequel le canal primaire (400), par rapport au canal secondaire (415), est un canal à plus longue portée permettant plus de mobilité physique, dans lequel le canal primaire est un canal Bluetooth ou un canal Wi-Fi ; et- un dispositif de commande d'authentification (420) pour traiter les données d'authentification (310) afin de déterminer si le premier dispositif mobile (405, 105) est un dispositif de confiance, dans lequel le deuxième dispositif mobile est configuré pour réaliser le traitement en utilisant les données d'authentification comme entrée de paramètre variant dans le temps dans un algorithme d'authentification programmé sur un dispositif de commande d'authentification. - Deuxième dispositif électronique selon la revendication 8,
dans lequel les données d'authentification sont traitées pour jumeler les premier et deuxième dispositifs mobiles (105). - Deuxième dispositif électronique selon l'une quelconque des revendications 8 et 9,
dans lequel la réception des données d'authentification comprend en outre la capture d'une image du code à barres (505) en utilisant un lecteur du dispositif de commande d'authentification. - Deuxième dispositif électronique selon la revendication 10,
dans lequel le canal secondaire (415) est un canal optique utilisant une ligne de visée visuelle et/ou pouvant fonctionner pour échanger les données d'authentification entre une distance d'environ 1 mètre ou moins. - Deuxième dispositif électronique selon l'une quelconque des revendications 10 et 11,
dans lequel le lecteur est une caméra, un dispositif de balayage ou un laser. - Deuxième dispositif électronique selon l'une quelconque des revendications 8 à 12,
dans lequel le dispositif de commande d'authentification est configuré pour réaliser le traitement en comparant les données d'authentification avec des valeurs stockées afin de déterminer si une concordance existe. - Deuxième dispositif électronique selon l'une quelconque des revendications 8 à 12,
dans lequel les données d'authentification varient à certains intervalles de temps de sorte à servir de paramètre variant dans le temps pour l'algorithme d'authentification.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/343,733 US8041339B2 (en) | 2006-01-31 | 2006-01-31 | Method for secure authentication of mobile devices |
EP07762879.0A EP1980085B1 (fr) | 2006-01-31 | 2007-01-29 | Procédé d'authentification sécurisée de dispositifs mobiles |
PCT/US2007/002497 WO2007089758A2 (fr) | 2006-01-31 | 2007-01-29 | Procédé d'authentification sécurisée de dispositifs mobiles |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP07762879.0A Division EP1980085B1 (fr) | 2006-01-31 | 2007-01-29 | Procédé d'authentification sécurisée de dispositifs mobiles |
Publications (2)
Publication Number | Publication Date |
---|---|
EP3223488A1 EP3223488A1 (fr) | 2017-09-27 |
EP3223488B1 true EP3223488B1 (fr) | 2023-06-07 |
Family
ID=38257056
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP17165974.1A Active EP3223489B1 (fr) | 2006-01-31 | 2007-01-29 | Procédé d'authentification sécurisée de dispositifs mobiles |
EP07762879.0A Active EP1980085B1 (fr) | 2006-01-31 | 2007-01-29 | Procédé d'authentification sécurisée de dispositifs mobiles |
EP17165970.9A Active EP3223488B1 (fr) | 2006-01-31 | 2007-01-29 | Procédé d'authentification sécurisée de dispositifs mobiles |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP17165974.1A Active EP3223489B1 (fr) | 2006-01-31 | 2007-01-29 | Procédé d'authentification sécurisée de dispositifs mobiles |
EP07762879.0A Active EP1980085B1 (fr) | 2006-01-31 | 2007-01-29 | Procédé d'authentification sécurisée de dispositifs mobiles |
Country Status (5)
Country | Link |
---|---|
US (1) | US8041339B2 (fr) |
EP (3) | EP3223489B1 (fr) |
DE (1) | DE602007050768C9 (fr) |
ES (3) | ES2937644T3 (fr) |
WO (1) | WO2007089758A2 (fr) |
Families Citing this family (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006111782A1 (fr) * | 2005-04-19 | 2006-10-26 | Nokia Corporation, | Procede, dispositif et systeme de commande de l'introduction d'une application dans un dispositif de terminal mobile |
US20070265984A1 (en) * | 2006-04-24 | 2007-11-15 | Prakash Santhana | Financial transaction using mobile devices |
US8793490B1 (en) * | 2006-07-14 | 2014-07-29 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
US20080104170A1 (en) * | 2006-10-31 | 2008-05-01 | Microsoft Corporation | Collaborative Networks for Parallel Downloads of Content |
US8103247B2 (en) * | 2006-10-31 | 2012-01-24 | Microsoft Corporation | Automated secure pairing for wireless devices |
US20080175379A1 (en) * | 2007-01-23 | 2008-07-24 | Broadcom Corporation | Simple pairing to generate private keys for different protocol communications |
US8522019B2 (en) * | 2007-02-23 | 2013-08-27 | Qualcomm Incorporated | Method and apparatus to create trust domains based on proximity |
US8646056B2 (en) * | 2007-05-17 | 2014-02-04 | U.S. Cellular Corporation | User-friendly multifactor mobile authentication |
US8205093B2 (en) * | 2007-06-29 | 2012-06-19 | At&T Intellectual Property I, L.P. | Restricting access to information |
ES2805954T3 (es) * | 2007-07-20 | 2021-02-16 | Nokia Technologies Oy | Uso compartido de información en un espacio inteligente |
GB2455059A (en) * | 2007-10-09 | 2009-06-03 | Symbian Software Ltd | Transmitting device pairing information over multiple available out of band channels/interfaces |
US9177313B1 (en) * | 2007-10-18 | 2015-11-03 | Jpmorgan Chase Bank, N.A. | System and method for issuing, circulating and trading financial instruments with smart features |
FR2924294A1 (fr) * | 2007-11-28 | 2009-05-29 | France Telecom | Procede de transmission et systeme de telecommunications |
US9363108B2 (en) * | 2008-06-05 | 2016-06-07 | Cisco Technology, Inc. | System for utilizing identity based on pairing of wireless devices |
US20100082490A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Systems and methods for secure wireless transactions |
US8590021B2 (en) | 2009-01-23 | 2013-11-19 | Microsoft Corporation | Passive security enforcement |
US8693988B2 (en) * | 2009-06-16 | 2014-04-08 | International Business Machines Corporation | System, method, and apparatus for proximity-based authentication for managing personal data |
US8570281B2 (en) * | 2009-06-25 | 2013-10-29 | Ncr Corporation | Method and apparatus for multi-touch surface interaction for a financial application within a bank branch |
US8850196B2 (en) | 2010-03-29 | 2014-09-30 | Motorola Solutions, Inc. | Methods for authentication using near-field |
US8855300B2 (en) | 2010-09-30 | 2014-10-07 | Google Inc. | Image-based key exchange |
US20120130562A1 (en) * | 2010-11-19 | 2012-05-24 | General Electric Company | Data communication system for a rail vehicle and method for communicating data with a rail vehicle |
US9032493B2 (en) | 2011-03-31 | 2015-05-12 | Intel Corporation | Connecting mobile devices, internet-connected vehicles, and cloud services |
US9268545B2 (en) | 2011-03-31 | 2016-02-23 | Intel Corporation | Connecting mobile devices, internet-connected hosts, and cloud services |
FR2974261A1 (fr) * | 2011-04-15 | 2012-10-19 | France Telecom | Procede d'obtention de donnees de configuration pour l'etablissement d'une communication entre deux terminaux |
DE102011121567A1 (de) | 2011-12-20 | 2013-06-20 | Giesecke & Devrient Gmbh | Verfahren zum kontaktlosen Auslesen eines Identifikationsdokuments |
CN103258174B (zh) * | 2012-02-17 | 2016-04-20 | 上海贝尔股份有限公司 | 一种对射频识别标签进行身份识别的方法与设备 |
US9107028B2 (en) | 2012-12-14 | 2015-08-11 | Microsoft Technology Licensing, Llc | Coupling devices using multiple discovery zones |
US8955081B2 (en) | 2012-12-27 | 2015-02-10 | Motorola Solutions, Inc. | Method and apparatus for single sign-on collaboraton among mobile devices |
US8782766B1 (en) | 2012-12-27 | 2014-07-15 | Motorola Solutions, Inc. | Method and apparatus for single sign-on collaboration among mobile devices |
US8806205B2 (en) | 2012-12-27 | 2014-08-12 | Motorola Solutions, Inc. | Apparatus for and method of multi-factor authentication among collaborating communication devices |
US9332431B2 (en) | 2012-12-27 | 2016-05-03 | Motorola Solutions, Inc. | Method of and system for authenticating and operating personal communication devices over public safety networks |
US10567920B1 (en) | 2013-06-04 | 2020-02-18 | Konnect Solutions, Inc. | Location detection systems and methods of use |
US20150113593A1 (en) * | 2013-10-17 | 2015-04-23 | International Business Machines Corporation | Proximity based dual authentication for a wireless network |
MY172134A (en) * | 2013-11-25 | 2019-11-14 | Mimos Berhad | A system and method for cryptographic interactions for authentication and authorization using out-of-band inputs and outputs |
CN107206162A (zh) * | 2015-01-21 | 2017-09-26 | 施曼信医疗Asd公司 | 医疗设备控制 |
GB2547451B (en) * | 2016-02-18 | 2019-06-26 | Elekta ltd | Device identification |
WO2019150177A1 (fr) * | 2018-02-05 | 2019-08-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Asssurance de localisation de données assistée par réseau |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004090800A2 (fr) * | 2003-04-14 | 2004-10-21 | Giesecke & Devrient Gmbh | Porteuse de donnees sans contact |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09167098A (ja) * | 1995-07-28 | 1997-06-24 | Hewlett Packard Co <Hp> | 携帯装置用通信システム |
US6230002B1 (en) * | 1997-11-19 | 2001-05-08 | Telefonaktiebolaget L M Ericsson (Publ) | Method, and associated apparatus, for selectively permitting access by a mobile terminal to a packet data network |
US7103344B2 (en) * | 2000-06-08 | 2006-09-05 | Menard Raymond J | Device with passive receiver |
US6871063B1 (en) * | 2000-06-30 | 2005-03-22 | Intel Corporation | Method and apparatus for controlling access to a computer system |
FR2812509B1 (fr) * | 2000-07-26 | 2002-12-27 | Gemplus Card Int | Procede de reconnaissance securisee entre deux appareils d'un reseau radiofrequence |
JP4868195B2 (ja) | 2000-10-24 | 2012-02-01 | ソニー株式会社 | 電子機器および情報処理装置 |
US7561691B2 (en) * | 2001-11-12 | 2009-07-14 | Palm, Inc. | System and method for providing secured access to mobile devices |
US20030096595A1 (en) * | 2001-11-21 | 2003-05-22 | Michael Green | Authentication of a mobile telephone |
CN100505623C (zh) | 2002-03-26 | 2009-06-24 | 诺基亚有限公司 | 用于鉴权的装置、方法和系统 |
US8972582B2 (en) * | 2002-10-03 | 2015-03-03 | Nokia Corporation | Method and apparatus enabling reauthentication in a cellular communication system |
US7801283B2 (en) * | 2003-12-22 | 2010-09-21 | Lear Corporation | Method of operating vehicular, hands-free telephone system |
US20050221813A1 (en) * | 2004-04-05 | 2005-10-06 | Jarno Rajahalme | System and method for initiating auxiliary communication interfaces via a primary communication interface |
US20060036855A1 (en) * | 2004-08-10 | 2006-02-16 | Nokia Corporation | Short-range authentication |
JP4703238B2 (ja) * | 2004-12-15 | 2011-06-15 | パナソニック株式会社 | 無線網制御装置、無線lan中継装置、無線通信システム及び無線通信システムの通信方法 |
US7627341B2 (en) * | 2005-01-31 | 2009-12-01 | Microsoft Corporation | User authentication via a mobile telephone |
JPWO2006100714A1 (ja) * | 2005-03-18 | 2008-08-28 | 富士通株式会社 | 旅客及び貨物を輸送する手段における通信システム |
US7607014B2 (en) * | 2005-06-30 | 2009-10-20 | Hewlett-Packard Development Company, L.P. | Authenticating maintenance access to an electronics unit via wireless communication |
US20070060056A1 (en) * | 2005-07-25 | 2007-03-15 | Whitaker John E | Remote Access Method and Device |
US20070108269A1 (en) * | 2005-11-16 | 2007-05-17 | Benco David S | Processing merchant point-of-sale transactions using a mobile subscriber device |
-
2006
- 2006-01-31 US US11/343,733 patent/US8041339B2/en active Active
-
2007
- 2007-01-29 ES ES17165974T patent/ES2937644T3/es active Active
- 2007-01-29 DE DE602007050768.5A patent/DE602007050768C9/de active Active
- 2007-01-29 EP EP17165974.1A patent/EP3223489B1/fr active Active
- 2007-01-29 ES ES07762879.0T patent/ES2634504T3/es active Active
- 2007-01-29 WO PCT/US2007/002497 patent/WO2007089758A2/fr active Application Filing
- 2007-01-29 EP EP07762879.0A patent/EP1980085B1/fr active Active
- 2007-01-29 EP EP17165970.9A patent/EP3223488B1/fr active Active
- 2007-01-29 ES ES17165970T patent/ES2947292T3/es active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004090800A2 (fr) * | 2003-04-14 | 2004-10-21 | Giesecke & Devrient Gmbh | Porteuse de donnees sans contact |
Also Published As
Publication number | Publication date |
---|---|
DE602007050768C5 (de) | 2023-02-02 |
EP3223488A1 (fr) | 2017-09-27 |
EP1980085B1 (fr) | 2017-04-26 |
US20070178882A1 (en) | 2007-08-02 |
WO2007089758A3 (fr) | 2007-09-20 |
DE602007050768C9 (de) | 2024-01-25 |
EP1980085A2 (fr) | 2008-10-15 |
EP3223489B1 (fr) | 2023-01-04 |
ES2937644T3 (es) | 2023-03-30 |
WO2007089758A2 (fr) | 2007-08-09 |
ES2947292T3 (es) | 2023-08-04 |
ES2634504T3 (es) | 2017-09-28 |
EP3223489A1 (fr) | 2017-09-27 |
US8041339B2 (en) | 2011-10-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3223488B1 (fr) | Procédé d'authentification sécurisée de dispositifs mobiles | |
EP3698535B1 (fr) | Étiquette de préservation de la confidentialité | |
EP2064649B1 (fr) | Établissement d'une connexion en champ proche | |
CN101617346B (zh) | 用以基于接近度来部署动态凭证基础结构的方法和设备 | |
US8136731B2 (en) | Controlling connectivity of a wireless smart card reader | |
EP1239630A2 (fr) | Procédé et dispositif pour augmenter la sécurité de services de données sans fil | |
KR101338323B1 (ko) | 사용자 인증 시스템 및 사용자 인증 방법 | |
EP1806869A1 (fr) | Dispositif de communication et méthode de communication | |
JP2002058066A (ja) | 近距離無線アクセスおよび対応するサービス端末用のインタフェースを介してハイブリッド無線端末とサービス端末の間で近距離無線商取引を行う方法 | |
KR20150014316A (ko) | 근거리 무선 통신(nfc) 기능을 지원하는 화상형성장치 및 nfc 디바이스, 화상형성장치 및 nfc 디바이스에서 인증을 수행하는 방법 | |
Nagashree et al. | Near field communication | |
CA2541364C (fr) | Controle de connectivite d'un lecteur de cartes intelligentes sans fil | |
KR20130108442A (ko) | 이동통신 단말기에 저장되는 중요 금융 정보의 보안 저장소를 위한 시스템 및 방법 | |
CN104240080A (zh) | 移动支付的实现方法及装置 | |
EP1763936A1 (fr) | Procede de selection d'un ensemble de donnees parmi plusieurs en cours d'enregistrement dans un dispositif et dispositif correspondant | |
US20210256499A1 (en) | Non-contact communication method and communication device | |
US20180176716A1 (en) | Dynamic secure messaging | |
Monteiro et al. | A hybrid NFC–Bluetooth secure protocol for Credit Transfer among mobile phones | |
CA2880346C (fr) | Dispositif de lecture/ecriture et transpondeur pour echange de donnees via un champ electromagnetique | |
KR20130010757A (ko) | 엔에프씨 보안 프린트 시스템 및 방법 | |
Razaq et al. | Second-generation RFID | |
EP1873985B1 (fr) | Puissance de transmission d'une transmission sans fil déterminée sur la confidentialité des données cryptées véhiculées par la transmission | |
Churaev et al. | NFC payment security | |
Lerner | Mobile Technology and Security | |
Razaq et al. | Privacy and security problems in RFID |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED |
|
AC | Divisional application: reference to earlier application |
Ref document number: 1980085 Country of ref document: EP Kind code of ref document: P |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20180327 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20190903 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04W 12/50 20210101AFI20210316BHEP Ipc: H04L 29/06 20060101ALI20210316BHEP Ipc: H04W 12/06 20210101ALI20210316BHEP Ipc: H04W 84/12 20090101ALI20210316BHEP |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20210429 |
|
GRAJ | Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted |
Free format text: ORIGINAL CODE: EPIDOSDIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA OF AMERICA CORPORATION |
|
INTC | Intention to grant announced (deleted) | ||
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602007061680 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: H04L0029060000 Ipc: H04L0009400000 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04W 12/50 20210101ALI20220323BHEP Ipc: H04W 84/12 20090101ALI20220323BHEP Ipc: H04W 12/06 20090101ALI20220323BHEP Ipc: H04L 9/40 20220101AFI20220323BHEP |
|
INTG | Intention to grant announced |
Effective date: 20220406 |
|
GRAJ | Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted |
Free format text: ORIGINAL CODE: EPIDOSDIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
INTC | Intention to grant announced (deleted) | ||
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20221010 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
AC | Divisional application: reference to earlier application |
Ref document number: 1980085 Country of ref document: EP Kind code of ref document: P |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP Ref country code: AT Ref legal event code: REF Ref document number: 1578038 Country of ref document: AT Kind code of ref document: T Effective date: 20230615 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602007061680 Country of ref document: DE |
|
U01 | Request for unitary effect filed |
Effective date: 20230627 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2947292 Country of ref document: ES Kind code of ref document: T3 Effective date: 20230804 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG9D |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20230607 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 |
|
U04 | Request for unitary effect rejected |
Effective date: 20231012 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230908 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20231207 Year of fee payment: 18 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20231007 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20231007 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20231212 Year of fee payment: 18 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602007061680 Country of ref document: DE |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: ES Payment date: 20240205 Year of fee payment: 18 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20231205 Year of fee payment: 18 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 |
|
26N | No opposition filed |
Effective date: 20240308 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230607 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20240129 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20240129 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20240131 |